Extended Key Usages
ExtKeyUsageCodeSigning
Behavioral task
behavioral1
Sample
DefenderControl/dControl/dControl.exe
Resource
win7-20240704-en
Target
4ca5bd9bf0302f171cbd2209593d8a458b396bacf2bf38b56911764cc7482bcf
Size
446KB
MD5
7de90b2191346c50d0939495d7b7cb63
SHA1
ae1a9ce12792a2a53af63869b9c0c9904b0b8d45
SHA256
4ca5bd9bf0302f171cbd2209593d8a458b396bacf2bf38b56911764cc7482bcf
SHA512
f26024aab60a9338ddf6856a44bc8de90e8a14800d568f5bd0c03a186100f3fbfca9ee9ffabbc03fb59034e3f07b8d74e8f43b9582c1a3e7e347be2e7a5fbdfd
SSDEEP
12288:0C/GqmR15jCF4g5CXcVdfE8mKee50I1P9//DS4xzl:08K1dCd53P88HnZPA4xzl
resource | yara_rule |
---|---|
static1/unpack001/DefenderControl/dControl/dControl.exe | upx |
AutoIT scripts compiled to PE executables.
resource | yara_rule |
---|---|
static1/unpack002/out.upx | autoit_exe |
Checks for missing Authenticode signature.
resource |
---|
unpack002/out.upx |
ExtKeyUsageCodeSigning
KeyUsageCertSign
KeyUsageCRLSign
ExtKeyUsageTimeStamping
KeyUsageDigitalSignature
ExtKeyUsageTimeStamping
KeyUsageCertSign
KeyUsageCRLSign
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_UNINITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
IMAGE_FILE_RELOCS_STRIPPED
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_LARGE_ADDRESS_AWARE
IMAGE_FILE_32BIT_MACHINE
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ